Manufacturing is a huge industry with massive amounts of critical data and IoT surfaces, and it is also a lucrative target for cybercriminals. CyberEdBoard member Shankar Karthikason discusses how to secure your OT environment and build an effective cybersecurity program.
Two recent apparent ransomware attacks on health plans have potentially affected hundreds of thousands of individuals. One of the incidents allegedly involved the Conti ransomware group, and the other allegedly involved Hive. One of the health plans is already facing legal fallout.
The cost of a data breach is mighty. And for healthcare entities, the cost of a HIPAA violation also can prove costly. Greg Hoffman of Paubox shares five critical steps you might be overlooking to ensure emails remain HIPAA-compliant and tells how to take compliance responsibility out of human hands.
Leading organizations are exploring quantum computing, AI and blockchain as drivers for business transformation and intelligent change. Bijender Mishra, CISO of Alkem Laboratories, discusses how these technologies can help industries, including pharmaceuticals, improve productivity and growth.
Federal regulators are seeking public input about how they should consider the "recognized" security practices of organizations when taking potential HIPAA enforcement actions - and how to distribute a percentage of HIPAA fines to individuals harmed by violations.
If an organization doesn’t know who is accessing what, how can they be trusted to make sure a bad actor isn’t gaining access to data, assets, or systems they shouldn’t?
As Finnish technology giant Nokia announces it is ceasing sales in Russia over the war with Ukraine, the company is facing tough questions over how it helped enable a mass surveillance program that supports President Vladimir Putin's autocratic regime.
Life comes at you fast, especially when you're a breached business such as Okta, which may have exposed customer data or otherwise put the businesses paying for your product at risk. Here's how after detecting the breach, Okta fumbled its response, and what others should learn from this experience.
The number of major health data breaches posted to the federal tally so far in 2022 - and the total number of individuals affected by those breaches - has surged in recent weeks as reports of large hacking incidents continue to flow in to regulators.
A public health department and a medical specialty practice are among the latest entities reporting major hacking incidents affecting tens of thousands of individuals' sensitive health information. Some experts say the breaches follow disturbing, evolving cyber trends.
The Department of Health and Human Services has an ambitious regulatory agenda in the months ahead and plans for strong enforcement of HIPAA violations, says Lisa Pino, director of the HHS Office for Civil Rights, in an exclusive interview. She also discusses evolving breach trends.
The past month has been filled with action-packed virtual cybersecurity events as the enterprise community continues to deal with a myriad of cybersecurity challenges. While the topics covered were wide-ranging, ISMG analyzed two summits for common themes and shares the significant takeaways.
Michael Lines is working with ISMG to promote awareness of the need for cyber risk management. As a part of that initiative, CyberEdBoard posts draft chapters from his upcoming book, "Heuristic Risk Management: Be Aware, Get Prepared, Defend Yourself." This chapter is "Recognize the Threats."
The pandemic has raised the ante significantly for the attack surface and the level of insider threats facing healthcare sector entities, according to Dave Bailey, vice president of security services, and attorney Andrew Mahler, vice president of privacy and compliance, of consultancy CynergisTek.
Despite the drumbeat that began about a decade ago for healthcare entities to bolster their identity and access management, it is still an "incredibly weak" area for many, Lee Kim of HIMSS says. She discusses the effects of cyberattack trends and the Ukraine-Russia War on healthcare organizations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.